What tools do organizations use to guard their networks against threats?
antivirus software.
peer networks.
firewall.
routers.

Answers

Answer 1

Answer:

firewall

Explanation:

Answer 2

Answer:

The answer would be, C) Firewall

Explanation:

We can eliminate antivirus, because it helps to protect the file system against unwanted programs not from hackers. We can also eliminate routers because it helps you connect multiple devices to the Internet, and connect the devices to each other. A router won't keep a hacker away from important files, thus has nothing to do with protection. And last but not least, peer-to-peer networks. Peer-to-peer networks is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. So that definitely won't help.

Hope this helped! Have a great day! - Olli :]


Related Questions

Which technique will game developers use to provide more immersive simulations in future games?
A.
computer-hand interfaces
B.
brain-hand interfaces
C.
computer-technology interfaces
D.
brain-computer interfaces

Answers

Answer:

brain-computer interfaces

Explanation:

Programmers often author which type of information to guide test runs?

reports
guides
documentation
presentations

Answers

Hey there!

I think the answer would be A. reports. I’m not sure but

Hope this helps !


Hurry plz
Question 10 of 10
Which is the best explanation for why organization can lead to academic and career
success?
It allows you to locate materials, be aware of your assignments and plan time to
get things done.
It forces you to focus on one thing at a time.
It enables you to be more creative with assignments.
It fosters good connections between you, your peers and your teachers.

Answers

Answer: It allows you to locate materials, be aware of your assignments and plan time to get things done.

Hope it helped.

Which type of operating system is usually used in personal computers?

A [blank] operating system is usually used in personal computers

Answers

Answer:

A GUI based operating system is usually used in personal computers

Explanation:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).

The type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.

What is the Operating system?

An operating system may be defined as s type of system software that significantly regulates all sorts of hardware and software resources of the computer and provides common services for computer programs.

According to the context of this question, the three most fundamental operating systems for personal computers may include Microsoft Windows, macOS, and Linux.

All of these operating systems generally are graphical user interface (GUI) based. These are powerful and extensively used a program that controls and manages the hardware and other software on a computer.

Therefore, the type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.

To learn more about Operating systems, refer to the link:

https://brainly.com/question/22811693

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which type of operating system is usually used in personal computers?

Microsoft Windows.UNIX.LINUX.

Complete the statement below using the correct term.
To work in digital marketing, you will need at least a(n)
______ degree.

Answers

Answer:

for your digital marketing degree you would need at least a merit in your gcse's for computer science or media production or with a bachelor’s degree in computer science or information technology

April plans on starting a perfume business and decides she needs to first
conduct some marketing research. She wants to find out what kinds of
perfumes and scents women like to wear from as many women as possible.
Which data collection method should she use?
A. Case study
B. Focus group
C. Survey
D. Observation

Answers

B. A survey because she is trying to figure out what perfume and scents other women like to wear. That was she can compare and contrast different peoples opinions.

She should use Survey as the data collection method. Thus, option C is correct.

What is a data collection?

The process of obtaining and analyzing data on certain characteristics in an existing framework is known as data gathering as well as data capture. This procedure allows one to analyze events and provide answers to pertinent queries.

She is conducting a study to find out what perfumes and scents others women love wearing. She has the ability to contrast as well as compare the perspectives of others. April wants to launch a perfume company, but he first wants to carry out some research.

A sample is asked a planned group of inquiries as part of a survey. One can characterize the characteristics of the individuals from whom the selection was taken by using a fair representation, or another that is part of the sample of concern.

Therefore, option C is the correct option.

Learn more about data collection, here:

https://brainly.com/question/21605027

#SPJ2

why would you use a custom filter?

Answers

Answer:By specifying conditions, you can create custom filters that narrow down the data in the exact way that you want. You do this by building a filter. If you've ever queried data in a database, this will look familiar to you. Point to either Number Filters or Text Filters in the list.

Explanation:

In what way, if any, are the Internet and the World Wide Web related to each other?
The two systems are entirely different and unrelated
The World Wide Web is a subset of the Internet
The Internet is a subset of the World Wide Web.
The Internet and the World Wide Web are the same thing.

Answers

Answer:

the world wide web is the substitute of the internet because the internet is connected to far for the world wide web

meaning of this : the world wide web (www) is the caption that you use to search and the internet is the one that connects to the www and is what is used to get on the www

-hope this helps ❤

Which is an example of an effective study skill?

Answers

Answer:

the making note cards and quizzing yourself

Explanation:

Have Notes and call over a friend and test each other

HELP ME PLEASE!!!!!! 40 points

1. List two news stories that are directed to two different target audiences.
2. What is each story's target audience?
3. How does each story affect their target audience? (why is it geared toward that audience)
4.What news stories are important in your life? What stories do you pay most attention to? Write down at least six stories, and make sure you describe the stories and why they are relevant to you.
5. Look at your list and rank which news stories are the most “newsworthy”. Your result should be that you have identified the most and the least newsworthy stories.
6. What did the top three stories have that the bottom three don’t? (most vs least).



Answers

B.

1. People that work there and otheres that are at risk

2. Dog owners and potental dog owners

C.

1. It effects them because they are at risk

2. The owners are getting annoyed at there dogs for barking

D. This is your inttrest not mine sorry i can't do this one

E.

1. The first one is more news worthy because it is more needed to know

F. i have no idea how to awnser this one

for the second link its the second search result

Digital signatures are as legally acceptable as written signatures.
Digital signatures contain information such as birth date and Social Security number.
Digital signatures can be retrieved easily if they are lost.
Digital signatures show the handwriting of the signer as physical verification.
What is an advantage of using digital signatures?

Answers

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

As compare to the electronic signature the digital signature is more secure then that of.The signer's signature is seen on the digital signatures as the physical proof.Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

Name all the keys of the home row.

Answers

Answer:

A, S, D, and F and your right hand are J, K, l, and ; along with space bar for your thumbs

Explanation:

Which of the following is not an example of a red flag that would keep you from downloading an attachment

Answers

Answer:

The link contained in the email redirects you to a different site

Explanation:

This is not a red flag in the sense that, the ability of the link attached to the e-mail to re-direct you to another different site shows that it might be a phising message.

It is left for the person to re-verify and  decide if to go ahead to download it or not after it opens on a new site on the internet.

Answer:

  The attachment is a PDF file.

Explanation:

A link that causes an attachment to be downloaded and opened always presents a security risk. That risk is mitigated somewhat if you trust the sender to be security-conscious, and if you trust the target of the link to be free of malware.

So, a link with an untrusted source such as a company outsider, may present a security risk.

A message marked "urgent and time-sensitive" is employing "social engineering" to reduce your inhibitions against opening the link. That tends to be an indication that a security risk is involved.

A link that obscures the source of the attachment is less likely to be legitimate than one that is more transparent. That, too, is an indication of a security risk.

PDF files are traditionally considered to be safe document files that cannot execute code or introduce malware. This (the attachment is a PDF file) is likely the answer of choice.

_____

Comment on PDF files

The Adobe Acrobat PDF reader is known to have significant security risks, and hundreds of exploits are available to malware producers that will allow PDF files to introduce and execute unwanted code. There are alternative PDF readers with less vulnerability. And, there are file scanners available that can detect malware in PDF files.

do this plsss!
please check out the music video


Answers

Answer: Okay okay I will, and I'll like and subscribe for support!

Explanation:

Answer: Ok send the link ill let you know if its good r not

Explanation:

Which one of the following options is incorrect in Presenter View?
Move to the previous or next slide
View all the slides
Hide or unhide the current slide
Writing option not available

Answers

Answer:

Writing option not available

Explanation:

What is the purpose of lookup tables in spreadsheet software?
A. They allow the user to retrieve information from another location
in a table.
B. They allow the user to lock cells that contain information that
remains consistent.
C. They allow the user to create a graphic representation of a
selected table.
D. They allow the user to convert foreign currencies.

Answers

Answer:

A. They allow the user to retrieve information from another location

in a table.

Explanation:

The purpose of lookup tables in a spreadsheet software is that: A. they allow the user to retrieve information from another location in a table.

What is a spreadsheet software?

A spreadsheet software refers to a type of software program which is typically designed and develop with cells that are arranged in a tabulated format in rows and columns, so as to do the following on a data:

SortCalculateFormatArrange

In conclusion, the purpose of lookup tables in a spreadsheet software such as Microsoft Excel is that they allow end users to retrieve information from another location in a table.

Read more on spreadsheets here: https://brainly.com/question/4965119

#SPJ2

Press __________ to display Presenter view on a single screen.
ALT + F3
ALT + F5
CTRL + F3
SHIFT + F3

Answers

Answer:

ALT + F5

Explanation:

In power point presentation,the shortcut ALT + F5 is used to display presenter view on a single screen.

The presenter view separates the note of the speaker from the slide even on a single screen. Only the speaker sees the note, the people he is presenting to only see the slide.

An algorithm is a step-by-step series of instructions that, when followed, produces a definite and desired result. At this stage, programmers write the instructions in an informal, English-like language instead of programming .

Answers

Answer:

This method of informal English-like language is called Pseudo-Code.

Explanation:

Where words and English grammatical structure is used inplace of functions and variables.

Example being:

function Add

variable 1 + variable 2.

if variable 1 + variable 2 = desired variable

Do something good

end if

else

find out why

end else

end function

Would Translate to, in C#

public void Add(int var1, int var2, int var3)

{

   var3= var1 + var2;

  if(var3 = 1234)

  {

    return var3;

  }

  else

  {

   Console.WriteLine(var3);

   return var3;

  }

}

Which language is an example of a fifth-generation language?

Answers

Mercury, OPS5 and Prolog

Which option is most likely used to create many-to-many relationships in Access?

inner join
outer join
junction table
parameterized query

Answers

Answer:

Junction table.

Explanation:

Junction table is most likely used to create many-to-many relationships in Access.

A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.

Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.

In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.

Answer:

c

Explanation:

Does -8 = -21?
[this is NOT a trick question]
Yes....?
No!​

Answers

Answer:

No.

Explanation:

From my knowledge, negative 8 is 8 units to the left of zero, while 21 is 21 units to the left.

This means that they are two different negative numbers! If you see an equation like this, it would be labeled as false.

I'm quite sure I am correct, tell me so if otherwise! :)

#SpreadTheLove

Answer:

No

Explanation:

What options does the Table Tools Layout contextual tab contain? Select three options.
modify text direction
change font
insert rows and columns
add border and shading
split table

Answers

Answer:

This tab contains two tabs, Design and Layout that give you the ability to quickly format your table, insert or delete rows and columns, set the alignment for cells, and format the typography of the text in your table

Explanation:

The Layout tab section includes a selection method of cells, rows, columns, as well as the entire table, and further discussion can be defined as follows:

This tool is used for deleting or inserting rows and columns, resources for combining or dividing cells, cell alignment & margin settings, and Open Type font style options.The page contains 2 tabs design, that allow you to quickly style your table, insert or delete rows and columns, set cell orientation, and style the font of your table's content.

Therefore, the answer is "insert rows and columns, add border and shading, and splittable".

Learn more:

brainly.com/question/14054348

Which of the following geometric objects occupy two dimensions?
Check all that apply.
A. Pyramid
B. Ray
O C. Line
D. Cube
E. Triangle
F. Plane​

Answers

Answer:

E. Triangle

Explanation:

It's E, and F

A Pyramid is 3D

A Ray is 1D

A Line is 1D

A Cube is 3D

A Triangle is 2D

A Plane Is 2D

The two-dimensional objects are (e) triangle and (f) plane

How to determine the geometric objects?

Two-dimensional objects are object that have a flat surface, and they extend in two directions i.e. the x and y axes.

As a general rule, two-dimensional objects are represented by flat surface.

From the list of given options, the two-dimensional objects are (e) triangle and (f) plane

Others are either one-dimensional objects or three-dimensional objects

Read more about geometric objects at:

https://brainly.com/question/12280037

#SPJ2

Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit, our buying preferences, and so on. Do you think that this is ethical? If not, can you suggest ways to stop this activity? If yes, explain the context in which it is important to us.

Answers

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

5
Type the correct answer in the box. Spell the word correctly.
What aspect should you consider before adding pictures to a document?
You should structure the
first before you search for a relevant picture.
Reset
Next

Answers

Answer:

Document

Explanation:

Document because after you structure your document together the way you like you can add pictures.

Answer:

I think is tvibl irqfijqbiwnkefw (Document)

Explanation:

is the answer of plato

What symbols are used with HTML tags?

A) ()
B) []
C) {}
D) <>

Answers

Answer:

C?

Explanation:

Answer:

D.

Explanation:

HTML uses <> as tags, example: <p> designates a paragraph.

What means of preventing security breaches would you expect to find in a network which has attempted to provide protection from hackers and other external security threats?

Answers

Answer:

a firewall

Explanation:

a firewall is a way programmers can attempt to stop breaches, however every code has a zero day. (a bug that had zero days spent fixing it) even Microsoft had a couple zero days

What is a disadvantage of using transitions in a PowerPoint presentation?

-There are only a few types of transitions available in PowerPoint.
-Only one kind of transition can be used per presentation.
-They are difficult to apply to most slide templates.
-They can distract from the content of the slides in the presentation.

Answers

Answer:

they can distract from the content of the slides in the presentation

Explanation:

if you make it look really cool, you'll focus more on the graphics than the content

Compared to a bricks and mortar shop project, an online shop project would not need to worry about the feasibility of
fitting in with the company's strategic plan
timelines
commercial zoning laws for precincts
resource allocation

Answers

Answer: Commercial zoning laws for precincts

Explanation:

A is incorrect: All businesses must follow a strategic plan.

B is incorrect: All businesses must follow timelines.

D is incorrect: All businesses must know when and where to allocate resources.

Answer:

Answer: Commercial zoning laws for precincts

Explanation:

Pam wants to include a video from a website in an upcoming presentation. However, she knows she will not have access to an internet connection when it is time to present her PowerPoint file. How can she solve this problem? Use the drop-down menus to answer the question.

Answer:
Download and Save
Video On My PC
Media

Answers

Answer:

Download and save

Video on my pc

Media

Explanation:

Answer:

Download and save

Video on my pc

Media

Explanation:

right on edge

Other Questions
Block A, with a mass of 4 kg, is moving with a speed of 2 m/s while Block B, with a mass of 8.4 kg, is moving in the opposite direction with a speed of 6.1 m/s. The center of mass of the two block system is moving with a velocity of ____ m/s. Round your answer to the nearest tenth. Assume Block A is moving in the positive direction. Mr. Mole's burrow lies 5 meters below the ground. He started digging his way deeper into the ground, descending 3 meters each minute.Graph the relationship between Mr. Mole's elevation relative to the ground (in meters) and time (in minutes). Which one has higher ecosystem diversity, rain forest or desert? Really need help on this. I keep gettin it wrong please help!!! Can you answer this science question for me please? Employees at a manufacturing plant have seen productionrates change by approximately 105% annually. In contrast,the graph shows the change in the average annual wagesof the employeesWhich statement accurately compares the annual changein production to the annual change in average salary?50.00050.0000 The annual changes cannot be compared because theinitial production value is unknown.The annual change in production will, at some point,exceed the annual change in average salaryThe annual change in production increases at a slowerrate, 5% per year, than the annual increase in theaverage salary, $500 per year.The annual change in production increases at a slowerrate, 105% per year, than the annual increase in averagesalary, $500 per year4030.00020.00010.000 Write the cubic term for the Taylor series expansion of f(x) = sin(x) at c = pi/4I did the work, can you please check for me whether my work is right? Find the area of the rhombus. What impact does the loss of the sphere have on the plot? The First Men in the MoonA. Mr.Bedford will not be able to return to the moon. B. All of the gold has been lost with the sphere. C. Mr.Bedford must make a new sphere.D. Other people will discover how to make Mr.Cavorite. Find the area of the trapezoid If you made 6 moles of NO2 how many grams of N2 did you use? What is the solution to the system of equations?3 x + 10 y = negative 47. 5 x minus 7 y = 40.(1, 5)(1, 5)(1, 5)(1, 5) Which mixes number is equivalent to the improper fraction 4/3 How did the first railroad cars move on the rails?wind powerhorsesgasoline enginessteam power If f(x)=9x+2, What is the value of the function when x=4?If f(x)=9x+2, for what value of x is the value of the function 29? You need to be taller than 48" to ride the roller coaster. Which of the following inequalities shows the height Susan has to be to ride the roller coaster.h < 48"h > 48"h 48"h 48" Which of these is a function of the placenta?A To deliver the blastocyst after childbirthB. To carry nutrients to the cells of the uterusC. To carry wastes away from the embryoO D. To develop into fetal reproductive tissues While at a party, you notice a person starts to vomit and then collapse. What should you be your first concern as you approach the scene? Which leader in Iran wanted to establish a more traditional culture? NEED HELP this my work but i need more on how the corona virus has affected the country and all of us around the world"Our country is going through a lot. The coronavirus has taken a toll on our lives. It has affected thousands of people and is still going on. Many schools have been canceled all year which many students and families find it hard to believe. Weve learned to adapt to eLearning and its advantages. Quarantine has advantages like if people stop going outside there would be less chances of death caused by the virus. So many announcements about the number of deaths and new cases were made everyday, and even little kids were interested in them. This period has taught us a lot, especially "teamwork" skills - together, We Will Win the Virus, even when many people have lost their work. PLEASE ADD TO IT